IDEAS home Printed from https://ideas.repec.org/a/bla/jemstr/v14y2005i4p779-812.html
   My bibliography  Save this article

Property Rights Protection of Biotechnology Innovations

Author

Listed:
  • Diana M. Burton
  • H. Alan Love
  • Gokhan Ozertan
  • Curtis R. Taylor

Abstract

Protection of intellectual property embedded in self‐replicating biological innovations, such as genetically modified seed, presents two problems for the innovator: the need for copy protection of intellectual property and price competition between new seed and reproduced seed. We consider three regimes in two periods with asymmetric information: short‐term contracts, biotechnological protection, and long‐term contracts. We find that piracy imposes more intense competition for seed sales than does durability alone. Technology protection systems yield highest firm profit and long‐term contracts outperform short‐term contracts. Farmers prefer, in order, long‐term, short‐term, and biotechnical protection. Depending on monitoring cost, long‐term contracts may be socially preferred to short‐term contracts, with both preferred to biotechnical protection.

Suggested Citation

  • Diana M. Burton & H. Alan Love & Gokhan Ozertan & Curtis R. Taylor, 2005. "Property Rights Protection of Biotechnology Innovations," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 14(4), pages 779-812, December.
  • Handle: RePEc:bla:jemstr:v:14:y:2005:i:4:p:779-812
    DOI: 10.1111/j.1530-9134.2005.00083.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1530-9134.2005.00083.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1530-9134.2005.00083.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Takeyama, Lisa N, 1997. "The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property," Journal of Law and Economics, University of Chicago Press, vol. 40(2), pages 511-522, October.
    2. LeRoy Hansen & Mary Knudson, 1996. "Property Right Protection of Reproducible Genetic Material," Review of Agricultural Economics, Agricultural and Applied Economics Association, vol. 18(3), pages 403-414.
    3. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    4. Matin Qaim & Alain de Janvry, 2003. "Genetically Modified Crops, Corporate Pricing Strategies, and Farmers' Adoption: The Case of Bt Cotton in Argentina," American Journal of Agricultural Economics, Agricultural and Applied Economics Association, vol. 85(4), pages 814-828.
    5. Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
    6. Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-246, April.
    7. Swan, Peter L, 1980. "Alcoa: The Influence of Recycling on Monopoly Power," Journal of Political Economy, University of Chicago Press, vol. 88(1), pages 76-99, February.
    8. Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-957, October.
    9. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Khachaturyan, Marianna & Yiannaka, Amalia, 2006. "The Market Acceptance and Welfare Impacts of Genetic Use Restriction Technologies (GURTs)," 2006 Annual meeting, July 23-26, Long Beach, CA 21329, American Agricultural Economics Association (New Name 2008: Agricultural and Applied Economics Association).
    2. Stefan Ambec & Corinne Langinier & Stéphane Lemarié, 2008. "Incentives to Reduce Crop Trait Durability," American Journal of Agricultural Economics, Agricultural and Applied Economics Association, vol. 90(2), pages 379-391.
    3. Eaton, Derek, 2015. "Innovation and IPRs for Agricultural Crop Varieties as Intermediate Goods," 2015 Conference, August 9-14, 2015, Milan, Italy 211581, International Association of Agricultural Economists.
    4. Wilson, William W. & Huso, Scott R., 2008. "Trait Stacking, Licensing, and Seed Firm Acquisitions on Genetically Modified Grains: A Strategic Analysis," Journal of Agricultural and Resource Economics, Western Agricultural Economics Association, vol. 33(3), pages 1-20.
    5. Derek Eaton, 2013. "Innovation and IPRs in the Agricultural Seed Sector," CIES Research Paper series 19-2013, Centre for International Environmental Studies, The Graduate Institute.
    6. Gürtler, Oliver, 2006. "Software Piracy in the Video Game Market," Bonn Econ Discussion Papers 20/2006, University of Bonn, Bonn Graduate School of Economics (BGSE).
    7. Eaton, Derek, 2014. "A model of IPRs in the international supply chain of seeds and agricultural production," 2014 International Congress, August 26-29, 2014, Ljubljana, Slovenia 182643, European Association of Agricultural Economists.
    8. Gürtler, Oliver, 2005. "On Strategic Enabling of Product Piracy in the Market for Video Games," Bonn Econ Discussion Papers 36/2005, University of Bonn, Bonn Graduate School of Economics (BGSE).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
    2. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    3. Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
    4. Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo.
    5. Banerjee, Dyuti & Chatterjee, Ishita, 2010. "The impact of piracy on innovation in the presence of technological and market uncertainty," Information Economics and Policy, Elsevier, vol. 22(4), pages 391-397, December.
    6. Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    7. Nie, Jiajia & Zhong, Ling & Li, Gendao & Cao, Kuo, 2022. "Piracy as an entry deterrence strategy in software market," European Journal of Operational Research, Elsevier, vol. 298(2), pages 560-572.
    8. Chang, Yang-Ming & Walter, Jason, 2015. "Digital piracy: Price-quality competition between legal firms and P2P network hosts," Information Economics and Policy, Elsevier, vol. 31(C), pages 22-32.
    9. Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
    10. Yoon, Kiho, 2002. "The optimal level of copyright protection," Information Economics and Policy, Elsevier, vol. 14(3), pages 327-348, September.
    11. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    12. Uriel Spiegel & Uri Ben-Zion & Tchai Tavor, 2005. "Profit Maximization And Social Optimum With Network Externality," Working Papers 0509, Ben-Gurion University of the Negev, Department of Economics.
    13. Holm, Håkan, 2000. "The Computer Generation's Willingness to Pay for Originals when Pirates are Present – A CV study," Working Papers 2000:9, Lund University, Department of Economics, revised 16 Mar 2001.
    14. Lydia L. Gan & Hian Chye Koh, 2005. "The Profiles of Software Pirates among Tertiary Institutions in Singapore," Economic Growth Centre Working Paper Series 0508, Nanyang Technological University, School of Social Sciences, Economic Growth Centre.
    15. Shin-yi Wu & Pei-yu Chen, 2008. "Versioning and Piracy Control for Digital Information Goods," Operations Research, INFORMS, vol. 56(1), pages 157-172, February.
    16. Julie Holland Mortimer, 2007. "Price Discrimination, Copyright Law, and Technological Innovation: Evidence from the Introduction of DVDs," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 122(3), pages 1307-1350.
    17. Martin Peitz & Patrick Waelbroeck, 2005. "An Economist's Guide to Digital Music," CESifo Economic Studies, CESifo Group, vol. 51(2-3), pages 359-428.
    18. Liang Guo & Xiangyi Meng, 2015. "Digital Content Provision and Optimal Copyright Protection," Management Science, INFORMS, vol. 61(5), pages 1183-1196, May.
    19. Banerjee, Dyuti, 2013. "Effect of piracy on innovation in the presence of network externalities," Economic Modelling, Elsevier, vol. 33(C), pages 526-532.
    20. Michael Waldman, 2014. "What limits indirect appropriability?," Chapters, in: Richard Watt (ed.), Handbook on the Economics of Copyright, chapter 2, pages 26-48, Edward Elgar Publishing.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jemstr:v:14:y:2005:i:4:p:779-812. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.kellogg.northwestern.edu/research/journals/JEMS/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.